Loading…
Virtualization and Cyber Security: Arming Future Security Practitioners
Tharayanil, Midhun Babu, Whitney, Gill, Aiash, Mahdi, Benzaid, Chafika
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Data Mobility Management Model for Active Data Cubes
Thanh Dat Dang, Doan Hoang, Nanda, Priyadarsi
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Language for the Composition of Privacy-Enforcement Techniques
Cherrueau, Ronan-Alexandre, Douence, Remi, Sudholt, Mario
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags
Bonnefoi, Pierre-Francois, Dusart, Pierre, Sauveron, Damien, Akram, Raja Naeem, Markantonakis, Konstantinos
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
In Certificates We Trust -- Revisited
Reimair, Florian, Teufl, Peter, Prunster, Bernd
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Scalable Data Hiding Scheme Using Hilbert Space Curve and Chaos
Get full text
Conference Proceeding
Loading…
Loading…
Dynamic Security Policies Enforcement and Adaptation Using Aspects
Idrees, Muhammad Sabir, Ayed, Samiha, Cuppens-Boulahia, Nora, Cuppens, Frederic
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A Study of IEEE 802.15.6 Association Protocols
Jing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Loading…
Implementing Authentication Systems Based on Physical Unclonable Functions
Get full text
Conference Proceeding
Loading…
Disequilibrium: Tor's Exit Node Selection under the Stereoscope
Koch, Robert, Golling, Mario, Rodosek, Gabi Dreo
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Towards Tracing of k-Anonymized Datasets
Kiyomoto, Shinsaku, Nakamura, Toru, Miyake, Yutaka
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record System
Kumar, Naveen, Mathuria, Anish, Das, Manik Lal
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Mission-Aware Vulnerability Assessment for Cyber-Physical Systems
Xiaotian Wang, Davis, Matthew, Junjie Zhang, Saunders, Vance
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
A First Look at Android Malware Traffic in First Few Minutes
Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes
Sayfullina, Luiza, Eirola, Emil, Komashinsky, Dmitry, Palumbo, Paolo, Miche, Yoan, Lendasse, Amaury, Karhunen, Juha
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications
Puglisi, Silvia, Rebollo-Monedero, David, Forne, Jordi
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection
Alruhaily, Nada, Bordbar, Behzad, Chothia, Tom
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding
Loading…
Stationarity Enforcement of Accelerator Based TRNG by Genetic Algorithm
Chan, Jose Juan Mijares, Thulasiraman, Parimala, Thomas, Gabriel, Thulasiram, Ruppa
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Published in 2015 IEEE Trustcom/BigDataSE/ISPA (01.08.2015)
Get full text
Conference Proceeding